Spoofing: What It Is And How It’s Used In An Email Scam

Email spoofing is the use of a fake sender address in an email message. It is used by email scammers to hide the origin of their message. By modifying the “from”, “reply” and “return path” fields of the email header, they can make the email appear to be from someone else. This is easy to […]

Server Hosting: Can a Butterfly Put You out of Business?

There is a reason why meteorologists can’t predict the weather months in advance. It’s chaotic. This means that although it is readily modeled with the help of computers, it is highly sensitive to the smallest of inputs. Tiny inputs like the flapping of a butterfly’s wings in one area, can lead to a tornado weeks […]

Scoping Out Disaster Scenarios for a More Strategic Business Continuity Plan

The two words of business continuity might sound like a simple concept if you think you’re thoroughly prepared for disasters. If you haven’t had a professional audit of your company, however, you probably only know a quarter of the potential things that could happen to bring excessive downtime. As it’s always said, you probably don’t […]

SANS Policy Templates: Disaster Recovery

The SANS Institute has published several information security policy templates describing best data security practices in template format. This largely means that you can ‘fill in the blanks’ when developing a security policy (although some modification will be in order for your specific circumstances). In this post we’ll look at the SANS template for disaster recovery planning. Disaster […]

Recover From Disaster Before it Strikes

Having a major incident is something no one looks forward to. But, not looking forward to, and intentionally avoiding discussing it are two entirely different things, and the key to recovering from a disaster is to have the discussions and implement the plans that arise from them today. Everyone hopes that it won’t happen to them, but […]

Putting the Risks of Data Loss and Business Downtime in Dollar Figures

While more and more companies are investing in disaster recovery and preparedness, there are still many remaining that have yet to follow suit. All organizations, no matter how big or small, should have a data backup and recovery plan. The problem is that some businesses don’t think it’s worth it to invest money into disaster […]

Network Security is Crucial for Small Businesses

Most business owners know how to think about physical security. They install security cameras over their cash registers, change locks when key employees leave and take cash to the bank whenever it reaches a certain amount. Unfortunately, many business owners don’t know that computer & network security are as important to the survival of their business as […]

Network Attached Storage (NAS) Systems

NAS (Network Attached Storage) systems are data storage devices that provide local area network nodes that allow users in a network to share the use of the storage. Each NAS has its own IP address and is therefore fully addressable. As such, these systems form the core of in-house clouds. However, most users of NAS systems link […]

Managing big data: Some tips for Consistency

It’s no secret that big data is an up-and-coming player in today’s high technology sector. As businesses and internet connections grow, more and more of the tech sector is consumed by the need to manage huge amounts of information. After all, you can learn a lot about your customer base by studying their habits, and in order […]

Is your company sending spam? How to keep your system from being utilized by spammers

Email spam certainly isn’t a new problem. Since the late 90s email spam has been flooding the inboxes of everyone from your grandmother to high-profile executives. It is, however, a persistent one, and the problems it presents can be multifaceted. When looking into spam prevention, there are a few things a company must consider in order to […]